Tag Archives: 2015

Happy Two-Factor Tuesday!!!

Check out some of my awesome posts on enabling Two-Factor What is Two-Factor? It’s something you know… like a password… and something you have, like an token generator or smartphone! That doesn’t mean have an easy to guess password though! You … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Happy Two-Factor Tuesday!!!

Scottrade Breach

“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Scottrade Breach

National Cyber Security Awareness Month Weeks 1 & 2

I’m on a mission to increase my Continuing Professional Education (CPE) credits and what better way than promote National Cyber Security Awareness Month? Just like I’ve been posting, October is National Cyber Security Awareness Month. Here are two videos I’ve … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on National Cyber Security Awareness Month Weeks 1 & 2

Stop. Think. Connect. Tips Infographic!

Here’s an awesome infographic on Stop. Think. Connect. Which is a National Cyber Security Awareness initiative by the National Cyber Security Alliance and the U.S. Department of Homeland Security. Learn more here.

Posted in Security Blog | Tagged , , , | Comments Off on Stop. Think. Connect. Tips Infographic!

Bypass Physical Security Using the Help of a Craigslist Job Ad

I spy, with my pi. A job ad was found on craigslist where some bad actors are hiring and paying up to $50/month to anyone who doesn’t adhere to their security policies and is willing to plug in a Raspberry … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Bypass Physical Security Using the Help of a Craigslist Job Ad

T-Mobile CEO Pissed Off at Experian

Hackers took T-Mobile customer names, addresses, Social Security numbers, birthdays, and even sensitive identification numbers from the servers owned and operated by Experian. Those FIFTEEN MILLION people whom applied for a regular T-Mobile USA postpaid plan between Sept. 1, 2013 and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on T-Mobile CEO Pissed Off at Experian

October is National Cyber Security Awareness Month!

National Cyber Security Awareness Month kicks off with STOP. THINK. CONNECT’s 5th Anniversary. Take a look at the week’s description and key messages. Also included are examples of how you can get involved, learn more and stay in touch. Also, … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on October is National Cyber Security Awareness Month!

Don’t Be a Victim of Tech Support Scams

This year alone, an estimated 3.3 million people in the United States will pay more than $1.5 billion to scammers. Attorney General Bob Ferguson and experts from Microsoft explain how scammers pretending to help you with computer problems can steal … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Don’t Be a Victim of Tech Support Scams

19 Laws of Information Security

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 19 Laws of Information Security

Volkswagen Hack

In the traditional meaning of the word hack, there are some half-million diesel powered Volkswagens out that have the capability to detect when they are hooked up to an emissions computer and switch modes to ‘burn clean’, which are normally … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Volkswagen Hack